AssetTracker Privacy Policy
Last
modified 23 February 2022
NOTICE OF LOCATION TRACKING During use of the Service, this app uses location tracking of your mobile device in the background as well as when the application is in the foreground while an Asset is checked out to you.
During app set-up, you must acknowledge and consent to location tracking when you click "Accept" on the "Background Location Access" pop-up for the app to properly function.
Key
Systems, Inc. (KSI), offers an object ("Asset") monitoring and
locating Service via our AssetTracker smartphone app ("this
Application") in conjunction with software on a Cloud Server,
software and hardware under a Service Customer's control, and
Bluetooth-enabled tags that can interact with a mobile device, such
as User's smartphone, running this Application. Users are typically
engaged by Customer in relationships, e.g. as employees or
contractors, requiring User access to Assets owned by Customer, such
as keys or equipment. Bluetooth-enabled AssetTracker tags attached to
the Assets interact with the User's device upon checkout to allow
this Application to monitor Asset location, Asset distance from
device, and tag status. As a result, this Application collects
Personal Data and passes some of it to the Cloud Server and/or
Customer as part of the Service. KSI is not responsible for loss or
theft of items tracked by AssetTracker tags, nor is KSI responsible
for the handling of Personal Data by Customer, User, or any party
other than KSI and any of its agents or affiliates contracted to
handle such Personal Data. Definitions of terms used herein can be
found in the section of this Policy entitled, "Definitions and Legal References."
Consent: Grant and Revocation Clicking "Accept" on the "Background Location Access" pop-up during app set-up constitutes your explicit consent to the collection of Personal Data as described in this
Privacy Policy, including location tracking, and to the terms of this Privacy Policy. You may
revoke consent to the collection of Personal Data at any time by
deauthorizing yourself and your device in this Application, bearing
in mind that such revocation does not pertain to Personal Data
collected prior to such revocation of consent. Simply deleting this
Application is not sufficient to revoke consent; you must deauthorize
to revoke consent.
Data Controller(s) and Owner(s)
Key
Systems, Inc. (KSI) – P.O. Box G, Fishers, New York, 14453,
800-888-3553,
support@keystorage.com
Service
Customer (Customer) – Identity and contact information vary
Types of Data Collected
This
Application collects Personal Data, by itself or through third
parties, including: Cookies, E-Mail Data, Device Data, Usage Data,
User Names, and Location Data, which are defined in "Definitions and Legal References,"
below. Other sections of this Privacy Policy may describe other
Personal Data collected, and some Personal Data may be described
contextually in dedicated text at the time of collection. Some
Personal Data may be freely provided by the User, and other Personal
Data may be collected automatically when using this Application,
whether the Application is in the foreground or background.
Purpose of Collection
Any use
of Personal Data, or of other tracking tools in connection with use
of this Application, unless stated otherwise, serves to identify
Users, verify Users, and remember Users' preferences, as well as to
monitor and locate a Bluetooth tag device attached to an Asset for
the sole purpose of providing the Service required by the Customer
and/or User. Failure or refusal to provide or to allow collection of
certain Personal Data may prevent this Application from providing its
part in the Service, as well as inability of User to access to one or
more Assets. The Customer and/or User assumes responsibility for the
Personal Data of third parties published or shared through this
Application by User and by such action(s) declare(s) to have the
right to communicate or broadcast such information, thereby relieving
the Data Controller of all responsibility therefor.
Method of Processing
The
Personal Data processing is carried out using computers and/or IT
enabled tools, following organizational procedures and modes strictly
related to the purposes indicated. More specifically, the Personal
Data is processed using a cloud-based Service, hosted on a Cloud
Server, that maintains a Database on behalf of Customer. The
cloud-based Service also interacts with Customer's existing
installation of software produced by Data Controller, Global
Facilities Management System (GFMS), which is installed and operated
on hardware controlled by Customer. The Personal Data is used to
verify and identify the User, to monitor the location of any tag
monitored by the Application and its distance from User's device,
to report circumstances or events as requested by Customer, to report
various conditions of any tag being monitored by the Application,
and/or to alert User of a potential loss of an Asset to which a
monitored tag is attached.
Security
Data
Controller shall take appropriate security measures to prevent
unauthorized access, disclosure, modification, or destruction of the
Personal Data under its control, which shall not include Personal
Data relayed to Customer once under Customer's control. In addition
to the Data Controller, the Data may in some cases be accessible to
certain types of persons in charge, involved with the operation of
the site (administration, sales, marketing, legal, system
administration) or external parties (such as third party technical
service providers, mail carriers, hosting providers, IT companies,
communications agencies) appointed, if necessary, as Data Processors
by the Owner. The updated list of these parties may be requested from
the Data Controller at any time.
Place Processed
The
Personal Data is processed at a facility hired by the Data Controller
for the purpose of hosting the software providing the Service on a
Cloud Server. Additional processing may occur at Customer's
facilities, which are not under Controller's control and for which
Controller is not responsible in any way.
Conservation Time The
Data is kept by the Data Controller for the time necessary to provide
the Service requested by the Customer. Subject to restrictions
imposed by law, the Customer, the Service Agreement between Customer
and Data Controller, and the relationship between the Customer and
the User, the User can request the Data Controller suspend Data
Collection or remove Personal Data under Data Controller's control.
The Use of the Collected Data The
Data concerning the User is collected to allow the Application to
furnish information required to provide the Service, and can include
sending e-mail, push, and notification messages.
Customer Installation of KSI's
Global Facilities Management System (GFMS)
GFMS is
used by Customer to monitor and control access to Assets stored in
KSI Security Asset Managers (SAMs) and related Asset storage hardware
owned and/or controlled by Customer. Among other services, GFMS
maintains a database of Authorized Users, Monitored Assets,
hierarchical permissions assigned to Users and Assets, Events
associated with Assets and Users, and Asset Location Data. User
Personal Data, including Location Data, is used by the Service to
generate Asset Location Data that is relayed to GFMS. GFMS also
includes e-mail address management and message sending capabilities
and interacts with the Cloud Server to generate notifications and/or
messages on User's Device, as well as to send notifications to
Customer personnel under certain conditions set by Customer.
Personal
Data collected: GFMS UserID, GFMS-Associated User e-Mail Address,
Location Data, Usage Data (e.g. Asset Transaction and Events).
Customer Asset Storage Hardware Assets
with tags are stored in hardware under Customer's control, which
may include SAMs and related KSI products. It is also possible for
tagged Assets to be stored in other ways under Customer's control.
GFMS gathers tag and Asset information directly from tags or via
storage hardware and relays some Data to the Service, which then
relays some Data to the Application. In addition, Data collected by
this Application may ultimately reach Customer's Asset storage
hardware. Data Controller has no control over the Customer's Asset
storage hardware.
Legal Action User's
Personal Data may be used for legal purposes by Data Controller in
Court or in the stages leading to possible legal action arising from
improper use of this Application or the related services.
Additional Information about User's
Personal Data In
addition to the information in this privacy policy, this Application
may provide the User with contextual information concerning
particular services or the collection and processing of Personal
Data.
System Logs and Maintenance For
operation and maintenance purposes, this Application and any third
party services may collect files that record interaction with this
Application (System Logs) or use for this purpose other Personal Data
(such as IP Address).
Information Not Contained in This
Policy More
details concerning the collection or processing of Personal Data may
be requested from the Data Controller at any time at its contact
information.
User Rights Subject
to restrictions imposed by the Customer, the Service Agreement
between Customer and Data Controller, and the relationship between
the Customer and the User, the User has the right, at any time, to
know whether his or her Personal Data has been stored, as well as the
contents and origin of the Personal Data, to verify accuracy or to
ask for the Personal Data to be supplemented, cancelled, updated or
corrected, to ask the Personal Data to be converted into an anonymous
format, to block any of the Personal Data held in violation of the
law, and/or to oppose the treatment of the Personal Data for any and
all legitimate reasons, with the caveat that doing so may prevent
this Application from providing the Service. Requests should be sent
to Data Controller at the contact information set out above. This
Application does not support "do not track" requests inasmuch as
the whole point of the Service is to track and monitor Assets
attached to tags in communication with User's device and to enable
Customer to hold User accountable for such Assets' disposition.
Changes to This Privacy Policy The
Data Controller reserves the right to make changes to this privacy
policy at any time by giving notice to its Users on this page. It is
strongly recommended that the User check this page often, referring
to the date of the last modification listed at the bottom. If a User
objects to any of the changes to the Policy, the User must cease
using this Application and can request the Data Controller to erase
the Personal Data, Subject to restrictions imposed by the Customer,
the Service Agreement between Customer and Data Controller, and the
relationship between the Customer and the User. Unless stated
otherwise, the then-current privacy policy applies to all Personal
Data the Data Controller has about Users.
Information
about This Privacy Policy The
Data Controller is responsible for this privacy policy.
European
Users For
Customers monitoring Assets in the European Union, Controller hires
GDPR-compliant Cloud Server facilities in the European Union. or
elsewhere that have included the GDPR Model Clauses as set forth in
European Commission Decision (EC Dec.) C(2010)593. This Privacy
Policy constitutes a notice prepared in fulfillment of the
obligations imposed by Article 12 of Regulation (EU) No. 2016/679 and
is solely about this Application and the associated Service.
Controller does not employ a Data Protection Officer, nor does
Controller have an E.U. representative. User has a right to lodge a
complaint with an appropriate Supervisory Authority, such as the
European Data Protection Supervisor
(https://secure.edps.europa.eu/EDPSWEB/) through which User can learn
how to/with what body User should file a complaint. The provision of
the Personal Data is a contractual requirement for providing the
Service(s); conversely, failure to provide the Personal Data will
prevent User's access to Assets monitored by the Service(s).
Automated decision-making is employed with regard to Asset use per
any restrictions imposed upon User's access, which may result in
sending notifications to authorities in Customer's organization,
such as when contact with a monitored Asset is established/lost, when
an Asset enters/leaves a particular area or is overdue for return,
when an Asset tag battery has reached a particular level of charge,
and the like.
Intellectual
Property The
Service and its original content, features, and functionality are and
will remain the exclusive property of Key Systems, Inc., and its
licensors, protected by copyright, trademark, patent, and/or other
laws of the United States and other countries. Prior written consent
of Key Systems, Inc., is required for use of KSI's trademarks and
trade dress in connection with any product or service.
Links to Other Web Sites This
Application and/or the Service may provide links to third party web
sites or services that are not owned or controlled by Key Systems,
Inc. Key Systems, Inc., has no control over, and assumes no
responsibility for, the content, privacy policies, or practices of
any third party web sites or services, nor does Key Systems, Inc.,
warrant the offerings of any of these entities/individuals or their
websites. User acknowledges and agrees that Key Systems, Inc., shall
not be responsible or liable, directly or indirectly, for any damage
or loss caused or alleged to be caused by or in connection with use
of or reliance on any content, goods or services available on or
through any such third party web sites or services. Key Systems,
Inc., strongly advises User to read the terms and conditions and
privacy policies of any third party web sites or services visited.
Definitions and Legal References
Personal Data (or Data) Any
information relating to an identified or identifiable natural person,
where an identifiable natural person is one who can be identified,
directly or indirectly, in particular by reference to an identifier
such as a name, an identification number, location data, or an online
identifier (such as a User Name), or to one or more factors specific
to the physical, physiological, genetic, mental, economic, cultural
or social identity of that natural person. In addition, for at least
the purposes of the Model Clauses of EC Dec. C(2010)593, 'personal
data', 'special categories of data', 'process/processing',
'controller', 'processor', 'data subject' and
'supervisory
authority'
shall have the same meaning as in Directive 95/46/EC of the European
Parliament and of the Council of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the
free movement of such data.
This Application
The KSI
AssetTracker application, a software tool that may collect Personal
Data to provide services described above.
Device A
smartphone or other computing device on which this Application is
installed and/or runs, whether owned by User or another party and
operated by User.
User The
individual using this Application, which must coincide with or be
authorized by the legal or natural person to whom the Personal Data
refer (the Data Subject).
E-Mail Data Includes
User-supplied e-mail address(es), as well as authorization, and
confirmation messages sent to the User's e-mail account(s). This
may also include dates and times of viewing, reading, deleting, or
otherwise manipulating such messages and/or their content, such as
links in the messages.
Device Data Includes
a unique device ID created by this Application, as well as platform
and other device information needed to perform the Service.
Usage Data Information
collected automatically from or on behalf of this Application, which
can include: name/attributes of computer network(s) to which the
Device connects; identifiers of Assets User is authorized to check
out; events regarding Assets checked out to User; IP addresses/domain
names of the Device hosting this Application and/or computers or
other devices used by Users of this Application; Uniform Resource
Identifiers (URIs) used to submit requests to a server(s), as well as
time/method of submission, the size of any file received in response,
any numerical code representing the status of a server's answer
(successful outcome, error, etc.), the country of origin of the
request, operating system of the Device, various time details per
visit (e.g., the time spent on each page within the Application) and
details about the path followed within the Application with special
reference to the sequence of pages visited, and other parameters
about the device operating system and/or the User's IT environment.
User Name (or User ID) An
identifier by which the User is known to a computer-implemented
system, such as KSI's GFMS, a facilities maintenance system, an
access control system, an e-mail service provider, or other service
provider, for the purposes of authorization and/or access,
particularly in conjunction with a password, challenge question(s),
security token, and/or other authorization tools.
Data Controller (or Application
Owner, or Owner) The
natural person, legal person, public administration, or any other
body, association or organization with the right, also jointly with
another Data Controller, to make decisions regarding the purposes,
and the methods of processing of Personal Data and the means used,
including the security measures concerning the operation and use of
this Application. The Data Controller, unless otherwise specified, is
the Owner of this Application. For the purposes of EC Dec.
C(2010)593, this is also the Data Exporter where the Personal Data is
transferred by Controller out of the EU and/or the Data Importer
where Controller transfers the Personal Data into
the EU.
Data Processor A
natural person, legal person, public administration, or other body,
association or organization authorized by the Data Controller to
process the Personal Data in compliance with this privacy policy.
Cookie A small
piece of data stored in the User's device, typically as a result of
using a web browser to access a web page, but also used in other
contexts.
Last
modified 23 February 2022
|